Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if...

8
Top Tips for Securing the Mobilising Enterprise

Transcript of Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if...

Page 1: Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if users can access the right information at the right time. Network based policies need

Top Tips for Securingthe Mobilising Enterprise

Page 2: Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if users can access the right information at the right time. Network based policies need

Your corporate IT team shouldn’t resist the diversity of consumerisation… it should welcome it with open arms and a smile.

Catering for choice and varied user needs will enable you to turn the challenge of risk-laden personal devices into an opportunity to optimise productivity - and make IT the hero.

Embrace consumerisation

FLEXIBILITY | SCALABILITY | SECURITY

45%

XenApp

XenDesktop

XenMobile

ShareFile

NetScaler

of young professionals would accept a lower salary if the

company has flexibilityon device choice1

Alex expects to have the same mobility and choice in the workplace as he does in everyday life.

Within a workforce, there are many different user needs that have to be accounted for.

1

Page 3: Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if users can access the right information at the right time. Network based policies need

There is a risk your employees may access corporate data from devices which you can't secure or control.

Every device can be secure irrespective of the platform, ownership or location with security management that doesn't affect the user experience.

How many devices?

The average number of devices per knowledge worker by 20202

FLEXIBILITY | SCALABILITY | SECURITY

XenApp

XenDesktop

XenMobile

ShareFile

NetScaler

A company with 2,000 employees could have up to 12,000 devices accessing corporate systems.

Companies keep control by utilising security processes that don't affect the user experience.

Jailbreak detection

Automatic compliance initiation

Pre-enrolment device checks App blacklist / whitelist

Context-aware policies

Full or selective device wipe

AUTO DATA DELETION

SAFE ZONE

WARNING, CERTAIN APPS LOCKED DOWN

2

Page 4: Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if users can access the right information at the right time. Network based policies need

Enabling device choicedoesn't mean compromising on application security.

Users can access the consumer apps they want while you secure access to corporate apps and data on the same device. With "single-sign-on" and "sandboxed" corporate data, you can deliver a secure, user friendly solution.

It’s all about the apps

New malicious mobile malware between January – March 20153

Corporately secured apps and data are protected in a sandboxed zone.If the device is lost, the sandboxed information is wiped.

FLEXIBILITY | SCALABILITY | SECURITY

XenApp

XenDesktop

XenMobile

ShareFile

NetScaler

Using ‘single-sign-on’, Alex can access all of his apps without having to to log into each one individually.

100k +

To be most productive Alex needs to be able to work seamlessly with a range of corporate and consumer apps.

3

Page 5: Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if users can access the right information at the right time. Network based policies need

One of the biggest risks for corporate data is employees storing it on personal devices, memory sticks and consumer cloud storage.

You can offer them an alternate user friendly cloud storage that you control. In this way you keep your organisation safe and compliant.

Where’s your data?

FLEXIBILITY | SCALABILITY | SECURITY

XenApp

XenDesktop

XenMobile

ShareFile

NetScaler

Alex breaks data privacy regulations by saving corporate data on memory sticks, personal devices and his personal cloud storage.

Alex easily accesses and stores corporate data in your own corporate cloud storage which is controlled and complies withdata regulations.

The European Data Privacy

DirectiveRegulations

Data Compliance

UK Data Protection

Act

4

Page 6: Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if users can access the right information at the right time. Network based policies need

The true value of mobility can only be realised if users can access the right information at the right time.

Network based policies need to suit mobile workstyles – if there is a terrible user experience, IT savvy employees will find a wayto bypass your security.

User experience is key

XenApp

XenDesktop

XenMobile

ShareFile

NetScaler

Alex needs a seamless user experience, with policies that enable the right access to the right information - all with real-time trouble shooting and support.

Employees will find a way to bypass your security if your policies and access methodologies deliver a terrible user experience.

56%

More than half of Millennials admit they are likely to evade restrictive workplace controls4

FLEXIBILITY | SCALABILITY | SECURITY

5

Page 7: Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if users can access the right information at the right time. Network based policies need

The datacentre is no longer just the place where data is stored - it is the engine that drives your business.

Protecting your business is of critical importance. Netscaler is a secure gateway at the edge of your datacentre that controls apps and enforces policies before anything enters the network.

Protect the datacentre

FLEXIBILITY | SCALABILITY | SECURITY

XenApp

XenDesktop

XenMobile

ShareFile

NetScaler

Global datacentre traffic will triple over the next five years5

Alex interacts seamlessly with the datacentre, with the same user experience, no matter where he is or what device he uses.

Delivery network

NetScalerNetscaler is the gateway to the datacentre enforcing the 5W’s of contextual access – who / what / when / where / why?

SaaS cloud appsVirtual apps

The datacentre has become the central hub of the business where apps reside.

Native mobile apps

6

Page 8: Top Tips for Securing the Mobilising EnterpriseThe true value of mobility can only be realised if users can access the right information at the right time. Network based policies need

7

Find out more

For more information please visit:

1. Cisco Global IT Survey 2013

2. https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/workplace-of-the-future-a-global-market-research-report.pdf

3. https://securelist.com/analysis/quarterly-malware-reports/69872/it-threat-evolution-in-q1-2015/

4. http://www.softwareadvice.com/security/industryview/millennial-threat-report-2015/

5. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/Cloud_Index_White_Paper.html

References